Tuesday, December 29, 2009
Microsoft Word sale prohibited as of Jan. 11
Microsoft Word is now scheduled to be prohibited from sale beginning January 11, 2010. The good news: Microsoft has promised a fix, one which will be rolled out before the deadline arrives.
If you don't understand, you might have simply missed this story, or dismissed it as something that Microsoft would ultimately use its considerable clout to have pushed under a legal rug.
But it's no joke. In August of this year, a court sided with a small Canadian company called i4i that holds a 1998 patent on the way the XML language is implemented, finding that Microsoft was in violation of that patent. The result: Microsoft was told to license the code in question from i4i or reprogram it, or else Microsoft Word would have to be removed from sale in the market. The original ruling gave Microsoft until October to get its legal affairs in order, but appeals pushed that out a bit.
Now a federal court has upheld that original ruling -- plus a fat, $290 million judgment against the company -- imposing the new January 11 D-Day on the matter. Microsoft Word and Microsoft Office will both be barred from sale as of that date -- though naturally you'll still be able to use copies of Word and Office that you already own, and Microsoft will be allowed to keep supporting those copies.
Unless Microsoft ships the promised technical workaround very quickly, things are going to get extremely dicey in the computer world, and fast. Not only will retail outlets selling shrinkwrapped copies of the software be affected, computer manufacturers (who complained loudly about this injunction when it was announced) who bundle Word and Office on the computers they sell will also be seriously impacted by the ruling.
There's always a chance things will change again as the January 11 deadline approaches, but if your company requires Word or Office to keep operations running, it might not be a bad idea to stock up on a few extra copies now.
Thursday, December 24, 2009
NOTEBOOK BUYING GUIDE
Notebook has become must have accessory for modern life. Most user prefer notebook then PC
As more user choose notebook, manufacture have launch more & more model to suite demand & budget. This is simple guide for user to choose the best notebook to suite them
Either student or home user,low prices are the first choice then portability comes second. A laptop that can be carried from class to class is key, so many students turn to low-cost Notebooks, which are small, low-power systems that generally cost less than Rm1500. The downside is that these have small screens and generally use underpowered single-core CPUs (Intel Atom). Example: Dell Inspiron Mini 10V or Acer Aspire One D250 or HP mini 110-1000 PC series.
Spec:
Intel® Atom™ Processor N280
• 1.66 GHz, 512 KB L2 Cache, 667 MHz FSB
RAM 1GB memory
Screen 10.1” Diagonal SD LED Anti-glare Widescreen Display
Product weight 1kg-1.3 kg
Another option is a 13 or 14 inch laptop, which is less portable, but makes for a better experience when sitting down to write papers and do research. These have dual-core CPUs and often include optical drives. Notebook cost from Rm1500 to Rm 2000 Example: Dell Inspiron 13, Dell Inspiron 14, Compaq Presario CQ40, Compaq Presario CQ45, Compaq Presario CQ50 series.
As more user choose notebook, manufacture have launch more & more model to suite demand & budget. This is simple guide for user to choose the best notebook to suite them
Either student or home user,low prices are the first choice then portability comes second. A laptop that can be carried from class to class is key, so many students turn to low-cost Notebooks, which are small, low-power systems that generally cost less than Rm1500. The downside is that these have small screens and generally use underpowered single-core CPUs (Intel Atom). Example: Dell Inspiron Mini 10V or Acer Aspire One D250 or HP mini 110-1000 PC series.
Spec:
Intel® Atom™ Processor N280
• 1.66 GHz, 512 KB L2 Cache, 667 MHz FSB
RAM 1GB memory
Screen 10.1” Diagonal SD LED Anti-glare Widescreen Display
Product weight 1kg-1.3 kg
Another option is a 13 or 14 inch laptop, which is less portable, but makes for a better experience when sitting down to write papers and do research. These have dual-core CPUs and often include optical drives. Notebook cost from Rm1500 to Rm 2000 Example: Dell Inspiron 13, Dell Inspiron 14, Compaq Presario CQ40, Compaq Presario CQ45, Compaq Presario CQ50 series.
Tuesday, December 22, 2009
My notebook - Windows 7 compatibility test result
I have post this before without testing it. I decided to test it on my notebook
Have to agree before you can install
Finish & launch the program. I displayed result & my system compatibility issue
The result show that my system is not compatible to run Windows 7
My conclusion:
Before you decide to upgrade to windows 7 please to the system check to make sure your system capable to run this new OS.
To see if your PC is ready for Windows 7, download the free Windows 7 Upgrade Advisor. It scans your PC for potential issues with your hardware, devices, and installed programs, and recommends what to do before you upgrade
Click here to scan your PC for compatibility
Click here to scan your PC for compatibility
This is the result tested on my Notebook
After click above link it directed to Microsoft download site.
I download the files to my desktop & run it.Have to agree before you can install
Finish & launch the program. I displayed result & my system compatibility issue
The result show that my system is not compatible to run Windows 7
My conclusion:
Before you decide to upgrade to windows 7 please to the system check to make sure your system capable to run this new OS.
Thursday, December 17, 2009
PC Hardware Components - Network Card
Network card / LAN card is used to connect your PC to a Network. Some broadband modems also can be connected to the PC using LAN cards. Most of the new LAN cards are using a port called “Ethernet port” which is in the back of the card. Network cables are required to connect a PC with a LAN card to rest of the computers or to a broadband modem.
Now days there is new wireless network card to connect via WIFI
PC Hardware Components - Sound Card
This computer hardware component is used to send the sound to your speakers. This is the card that you plug speaker cables. Sound card also built-in to the Mother Board in some PCs.
Having a quality sound card is a must for latest games and especially if you are using your PC to watch movies and listen to music.
PC Hardware Components - Graphics Card (VGA card)
This is the device that sends the output to your monitor. You fix the monitor cable to the back of the VGA card (VGA port) in order to get the display. Please note that some of the computers have the VGA card built-in with the motherboard. You won't see a separate card for VGA in these computers.There are slots on the Mother Board to fix the graphics card. VGA card has its own memory to hold graphics and videos. It is important to have a VGA card with high memory if you want to play latest PC games.
PC Hardware Components - MotherBoard
MotherBoard is the main circuit board inside your computer. All other PC computer parts are connected to specific slots on the Mother Board. Sometimes it is called as the Main Board. Motherboard has in-built chips. One of it holds the computer time. Motherboard also has a battery, which will enable it to function some tasks such as maintaining the system time even when the PC is switched off.
PC Hardware Component - Hard Disk
Hard Disk is the computer's permanent storage capacity. Size of the Hard Disk determines how many files pr programs can be saved in your computer. Unlike RAM, you can store your files permanently in the Hard Disk until you remove them.
Ex: Take the example under above Memory section. Hard Disk is similar to the book, because the items written in the book are permanent.
Ex: Take the example under above Memory section. Hard Disk is similar to the book, because the items written in the book are permanent.
PC Hardware Components - Memory or RAM
RAM (Random Access Memory) holds all of the "active" information that the computer is using. Memory is empty when your PC is switched off Then each program or data file used grab part of the system memory. When you close a program the memory grabed by that program is freed up. Generally, the more memory your system has, the more things you can do with it simultaneously. Increasing the amount of memory in the system also improves performance in most cases.
Even though it is a Computer hardware component, RAM is also like humen memory. Imagine you are reading a book. When you start reading a book the content of the book remains in your memory. But it goes away when your attention goes to somewhere else.
Even though it is a Computer hardware component, RAM is also like humen memory. Imagine you are reading a book. When you start reading a book the content of the book remains in your memory. But it goes away when your attention goes to somewhere else.
PC Hardware Components - The Processor
This is the "brain" of your Computer. An extremely sophisticated piece of miniaturized electronics, the processor (often called the CPU or Central Processing Unit) is at the bottom of all tasks the PC performs. The processor reads instructions (commands) from memory that tell it what it needs to do to accomplish the work that the user wants, and then executes them. Intel is one of the major manufacturers of Computer processors.
Ex: Intel Pentium III 400GhzIn this example Intel is the manufacturer. Pentium is their product type (Intel manufacture Celeron range as well). "III 400Ghz" is the processor speed. So Pentium "IV 200 Ghz" is faster than "III 400Ghz".
Ex: Intel Pentium III 400GhzIn this example Intel is the manufacturer. Pentium is their product type (Intel manufacture Celeron range as well). "III 400Ghz" is the processor speed. So Pentium "IV 200 Ghz" is faster than "III 400Ghz".
Wednesday, December 16, 2009
9 ways to increase the security of your laptop
Using your laptop to get work done away from your office or on the road is becoming widely accepted. But this rapid growth in laptop computing has made portable systems the target for theft around the world. If your laptop computer is stolen, company information can be exposed, as well as your personal and financial information.
Use these 9 tips to learn how you can keep your laptop more secure when you're on the road.
1. Avoid using computer bags
Computer bags can make it obvious that you're carrying a laptop. Instead, try toting your laptop in something more common like a padded briefcase or suitcase.
2. Never leave access numbers or passwords in your carrying case
Keeping your password with your laptop is like keeping the keys in the car. Without your password or important access numbers it will be more difficult for a thief to access your personal and corporate information.
3. Carry your laptop with you
Always take your laptop on the plane or train rather then checking it with your luggage. It's easy to lose luggage and it's just as easy to lose your laptop. If you're traveling by car, keep your laptop out of sight. For example, lock it in the trunk when you're not using it.
4. Encrypt your data
If someone should get your laptop and gain access to your files, encryption can give you another layer of protection. With Windows XP, Windows Vista, and Windows 7 you can choose to encrypt files and folders. Then, even if someone gains access to an important file, they can't decrypt it and see your information. Learn more about how to encrypt your data with Windows XP, encrypt your data with Windows Vista, or encrypt your data with Windows 7.
5. Keep your eye on your laptop
When you go through airport security don't lose sight of your bag. Hold your bag until the person in front of you has gone through the metal detector. Many bags look alike and yours can easily be lost in the shuffle.
6. Avoid setting your laptop on the floor
Putting your laptop on the floor is an easy way to forget or lose track of it. If you have to set it down, try to place it between your feet or against your leg (so you're always aware it's there).
7. Buy a laptop security device
If you need to leave your laptop in a room or at your desk, use a laptop security cable to securely attach it to a heavy chair, table, or desk. The cable makes it more difficult for someone to take your laptop. There are also programs that will report the location of a stolen laptop. They work when the laptop connects to the Internet, and can report the laptop's exact physical location. One such tracing program is ComputracePlus.
8. Use a screen guard
These guards help prevent people from peeking over your shoulder as you work on sensitive information in a public place. This is especially helpful when you're traveling or need to work in a crowded area. This screen guard from Secure-It is just one example of a screen guard you could use.
9. Try not to leave your laptop in your hotel room or with the front desk
Too many things have been lost in hotel rooms and may not be completely secure. If you must leave your laptop in your room, put the "do not disturb" sign on the door
Use these 9 tips to learn how you can keep your laptop more secure when you're on the road.
1. Avoid using computer bags
Computer bags can make it obvious that you're carrying a laptop. Instead, try toting your laptop in something more common like a padded briefcase or suitcase.
2. Never leave access numbers or passwords in your carrying case
Keeping your password with your laptop is like keeping the keys in the car. Without your password or important access numbers it will be more difficult for a thief to access your personal and corporate information.
3. Carry your laptop with you
Always take your laptop on the plane or train rather then checking it with your luggage. It's easy to lose luggage and it's just as easy to lose your laptop. If you're traveling by car, keep your laptop out of sight. For example, lock it in the trunk when you're not using it.
4. Encrypt your data
If someone should get your laptop and gain access to your files, encryption can give you another layer of protection. With Windows XP, Windows Vista, and Windows 7 you can choose to encrypt files and folders. Then, even if someone gains access to an important file, they can't decrypt it and see your information. Learn more about how to encrypt your data with Windows XP, encrypt your data with Windows Vista, or encrypt your data with Windows 7.
5. Keep your eye on your laptop
When you go through airport security don't lose sight of your bag. Hold your bag until the person in front of you has gone through the metal detector. Many bags look alike and yours can easily be lost in the shuffle.
6. Avoid setting your laptop on the floor
Putting your laptop on the floor is an easy way to forget or lose track of it. If you have to set it down, try to place it between your feet or against your leg (so you're always aware it's there).
7. Buy a laptop security device
If you need to leave your laptop in a room or at your desk, use a laptop security cable to securely attach it to a heavy chair, table, or desk. The cable makes it more difficult for someone to take your laptop. There are also programs that will report the location of a stolen laptop. They work when the laptop connects to the Internet, and can report the laptop's exact physical location. One such tracing program is ComputracePlus.
8. Use a screen guard
These guards help prevent people from peeking over your shoulder as you work on sensitive information in a public place. This is especially helpful when you're traveling or need to work in a crowded area. This screen guard from Secure-It is just one example of a screen guard you could use.
9. Try not to leave your laptop in your hotel room or with the front desk
Too many things have been lost in hotel rooms and may not be completely secure. If you must leave your laptop in your room, put the "do not disturb" sign on the door
Monday, December 7, 2009
Thursday, December 3, 2009
Find out if your PC can run Windows 7
To see if your PC is ready for Windows 7, download the free Windows 7 Upgrade Advisor. It scans your PC for potential issues with your hardware, devices, and installed programs, and recommends what to do before you upgrade
Click here to scan your PC for compatibility
Click here to scan your PC for compatibility
What is System Restore?
System Restore helps you restore your computer's system files to an earlier point in time. It's a way to undo system changes to your computer without affecting your personal files, such as e‑mail, documents, or photos.
Sometimes, the installation of a program or a driver can cause an unexpected change to your computer or cause Windows to behave unpredictably. Usually, uninstalling the program or driver corrects the problem. If uninstalling does not fix the problem, you can try restoring your computer's system to an earlier date when everything worked correctly.
System Restore uses a feature called System Protection to regularly create and save restore points on your computer. These restore points contain information about registry settings and other system information that Windows uses. You can also create restore points manually.
System Restore is not intended for backing up personal files, so it cannot help you recover a personal file that has been deleted or damaged. You should regularly back up your personal files and important data using a backup program.
•Open System Restore by clicking the Start button , clicking All Programs, clicking Accessories, clicking System Tools, and then clicking System Restore. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Sometimes, the installation of a program or a driver can cause an unexpected change to your computer or cause Windows to behave unpredictably. Usually, uninstalling the program or driver corrects the problem. If uninstalling does not fix the problem, you can try restoring your computer's system to an earlier date when everything worked correctly.
System Restore uses a feature called System Protection to regularly create and save restore points on your computer. These restore points contain information about registry settings and other system information that Windows uses. You can also create restore points manually.
System Restore is not intended for backing up personal files, so it cannot help you recover a personal file that has been deleted or damaged. You should regularly back up your personal files and important data using a backup program.
•Open System Restore by clicking the Start button , clicking All Programs, clicking Accessories, clicking System Tools, and then clicking System Restore. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
Wednesday, December 2, 2009
Windows Updates
Microsoft has released several new important security updates for Windows.
Every month Microsoft releases updates to fix security vulnerabilities in its software.
Windows PCs without these fixes could be vulnerable to attack by malicious programs.
The updates can be downloaded from www.windowsupdate.com or by enabling Automatic Updates.
Vista users can click the Start button, click All Programs, and then select Windows Update.
Every month Microsoft releases updates to fix security vulnerabilities in its software.
Windows PCs without these fixes could be vulnerable to attack by malicious programs.
The updates can be downloaded from www.windowsupdate.com or by enabling Automatic Updates.
Vista users can click the Start button, click All Programs, and then select Windows Update.
Tuesday, December 1, 2009
Common Symptoms Of Virus Infection
- Computer does not boot.
- Some virus infect your startup system. Strange massage appear
- Some virus infect your ragistry. Strange ststem or software run automatically
- Computer does not boot.
- Computer hard drive space is reduced.
- Applications will not load.
- An application takes longer to load than normal time period.
- Hard dive activity increases especially when nothing is being done on the computer.
- An anti virus software message appears.
- The number of hard drive bad sectors steadily increases.
- Unusual graphics or messages appear on the screen
- Files are missing (deleted)
- A message appears that hard drive cannot be detected or recognized.
- Strange sounds come from the computer.
- Some viruses take control of the keyboard and occasionally substitute a neighboring key for the one actually pressed. Another virus "swallows" key presses so that nothing appears on the screen.
- Also interesting are system time effects. Clocks going backwards are especially frightening for workers who cannot wait to go home. More seriously though, this type of virus can cause chaos for programs which depend on the system time or date.
- Cannot connect to network.
- Some virus infect your startup system. Strange massage appear
- Some virus infect your ragistry. Strange ststem or software run automatically
- Computer does not boot.
- Computer hard drive space is reduced.
- Applications will not load.
- An application takes longer to load than normal time period.
- Hard dive activity increases especially when nothing is being done on the computer.
- An anti virus software message appears.
- The number of hard drive bad sectors steadily increases.
- Unusual graphics or messages appear on the screen
- Files are missing (deleted)
- A message appears that hard drive cannot be detected or recognized.
- Strange sounds come from the computer.
- Some viruses take control of the keyboard and occasionally substitute a neighboring key for the one actually pressed. Another virus "swallows" key presses so that nothing appears on the screen.
- Also interesting are system time effects. Clocks going backwards are especially frightening for workers who cannot wait to go home. More seriously though, this type of virus can cause chaos for programs which depend on the system time or date.
- Cannot connect to network.
Virus and Spyware
Stap to protect your PC from viruses
- Automatic protection of anti-virus software should be turned on at all times.
- perform a manual scan or schedule a scan to occur automatically weekly.
- Scan all removable disks before first use.
- Enable Automatic Update option on anti-virus software
- Periodic backups of the hard disk should be done.
- Buy legal copies of all software they use and make write-protected backups.
- Email messages and email attachments from unknown people should not be opened.
- Make sure that Macro Virus Protection is enabled in all Microsoft applications, and they should never run macros in a document unless they know specifically the functionality of the macros.
- Appropriate Passwords should be assigned to the shared network drives.
- Disable auto run mood, so that auto virus form disk or removable drive cannot infect PC
- Automatic protection of anti-virus software should be turned on at all times.
- perform a manual scan or schedule a scan to occur automatically weekly.
- Scan all removable disks before first use.
- Enable Automatic Update option on anti-virus software
- Periodic backups of the hard disk should be done.
- Buy legal copies of all software they use and make write-protected backups.
- Email messages and email attachments from unknown people should not be opened.
- Make sure that Macro Virus Protection is enabled in all Microsoft applications, and they should never run macros in a document unless they know specifically the functionality of the macros.
- Appropriate Passwords should be assigned to the shared network drives.
- Disable auto run mood, so that auto virus form disk or removable drive cannot infect PC
Wednesday, November 25, 2009
COMPUTER VIRUS HISTORY
· In 1983, Fred Cohen coined the term “computer virus”, postulating a virus was "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.” The term virus is actually an acronym for Vital Information Resources Under Seize. Mr. Cohen expanded his definition a year later in his 1984 paper, “A Computer Virus”, noting that “a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs. Every program that gets infected may also act as a virus and thus the infection grows.” Computer viruses, as we know them now, originated in 1986 with the creation of Brain - the first virus for personal computers. Two brothers wrote it (Basid and Farooq Alvi who ran a small software house in Lahore, Pakistan) and started the race between viruses and anti-virus programs which still goes on today.
· Using the above explanation, it can be said that viruses infect program files. However, viruses can also infect certain types of data files, specifically those types of data files that support executable content, for example, files created in Microsoft Office programs that rely on macros.
· Compounding the definition difficulty, viruses also exist that demonstrate a similar ability to infect data files that don't typically support executable content - for example, Adobe PDF files, widely used for document sharing, and .JPG image files. However, in both cases, the respective virus has a dependency on an outside executable and thus neither virus can be considered more than a simple ‘proof of concept’. In other cases, the data files themselves may not be infectable, but can allow for the introduction of viral code. Specifically, vulnerabilities in certain products can allow data files to be manipulated in such a way that it will cause the host program to become unstable, after which malicious code can be introduced to the system. These examples are given simply to note that viruses no longer relegate themselves to simply infecting program files, as was the case when Mr. Cohen first defined the term. Thus, to simplify and modernize, it can be safely stated that a virus infects other files, whether program or data.
· Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
· There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself -- it is not alive. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
· A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to get executed. Once it is running, it is then able to infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
· A computer virus is a program that replicates. To do so, it needs to attach itself to other program files (for example, .exe, .com, .dll) and execute whenever the host program executes. Beyond simple replication, a virus almost always seeks to fulfill another purpose: to cause damage.
· Called the damage routine, or payload, the destructive portion of a virus can range from overwriting critical information kept on the hard disk's partition table to scrambling the numbers in the spreadsheets to just taunting the user with sounds, pictures, or obnoxious effects.
· It’s worth bearing in mind, however, that even without a ”damage routine”, if viruses are allowed to run unabated then it will continue to propagate--consuming system memory, disk space, slowing network traffic and generally degrading performance. Besides, virus code is often buggy and can also be the source of mysterious system problems that take weeks to understand. So, whether a virus is harmful or not, its presence on the system can lead to instability and should not be tolerated.
· Some viruses, in conjunction with "logic bombs," do not make their presence known for months. Instead of causing damage right away, these viruses do nothing but replicate--until the preordained trigger day or event when they unleash their damage routines on the host system or across a network.
· Using the above explanation, it can be said that viruses infect program files. However, viruses can also infect certain types of data files, specifically those types of data files that support executable content, for example, files created in Microsoft Office programs that rely on macros.
· Compounding the definition difficulty, viruses also exist that demonstrate a similar ability to infect data files that don't typically support executable content - for example, Adobe PDF files, widely used for document sharing, and .JPG image files. However, in both cases, the respective virus has a dependency on an outside executable and thus neither virus can be considered more than a simple ‘proof of concept’. In other cases, the data files themselves may not be infectable, but can allow for the introduction of viral code. Specifically, vulnerabilities in certain products can allow data files to be manipulated in such a way that it will cause the host program to become unstable, after which malicious code can be introduced to the system. These examples are given simply to note that viruses no longer relegate themselves to simply infecting program files, as was the case when Mr. Cohen first defined the term. Thus, to simplify and modernize, it can be safely stated that a virus infects other files, whether program or data.
· Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
· There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself -- it is not alive. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
· A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to get executed. Once it is running, it is then able to infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
· A computer virus is a program that replicates. To do so, it needs to attach itself to other program files (for example, .exe, .com, .dll) and execute whenever the host program executes. Beyond simple replication, a virus almost always seeks to fulfill another purpose: to cause damage.
· Called the damage routine, or payload, the destructive portion of a virus can range from overwriting critical information kept on the hard disk's partition table to scrambling the numbers in the spreadsheets to just taunting the user with sounds, pictures, or obnoxious effects.
· It’s worth bearing in mind, however, that even without a ”damage routine”, if viruses are allowed to run unabated then it will continue to propagate--consuming system memory, disk space, slowing network traffic and generally degrading performance. Besides, virus code is often buggy and can also be the source of mysterious system problems that take weeks to understand. So, whether a virus is harmful or not, its presence on the system can lead to instability and should not be tolerated.
· Some viruses, in conjunction with "logic bombs," do not make their presence known for months. Instead of causing damage right away, these viruses do nothing but replicate--until the preordained trigger day or event when they unleash their damage routines on the host system or across a network.
Monday, November 23, 2009
launch of Windows 7
Date: 24 November 2009 (TUE)
Time: 9.00am - 6.00pm
Venue: Kuala Lumpur
Convention Centre
Ragitration:
http://http//www.microsoft.com/malaysia/thenewefficiency/
Time: 9.00am - 6.00pm
Venue: Kuala Lumpur
Convention Centre
Ragitration:
http://http//www.microsoft.com/malaysia/thenewefficiency/
Subscribe to:
Posts (Atom)